Launched exploits are independent and doesn’t rely on service fingerprinting (to avoid evasion, if any)

The aim of creating winAUTOPWN is not to compete with already existing commercial frameworks like Core Impact (Pro), Immunity Canvas, Metasploit Framework (freeware), etc. which offer autohacks, but to create a free, quick, standalone application which is easy to use and doesn’t require a lot of support of other dependencies.

Also not forgetting that winAUTOPWN unlike other frameworks maintains the original exploit writer’s source code intact just as it was and uses it. This way the exploit writer’s credit and originality is maintained. The source is modified only when required to enable a missing feature or to remove hard-coded limitations. Under these circumstances also, the exploit writer’s credits remain intact.

Newer exploit modules are added as and when they release and older ones are also being daily added.

Binaries of perl, php, python and cygwin DLLs (included) are required to exist either in a common folder or should be properly installed with their paths registered for those exploits which are cannot be compiled into a PE-exe.

Some anti-viruses might falsely detect the exploits as malicious.

Version 2.2

Introduced BSDAUTOPWN - BSD equivalent for winAUTOPWN which is winAUTOPWN written and compiled to run on BSD systems.

Also, this version is:
Introducing BSDAUTOPWN v1.0. This is the BSD equivalent for winAUTOPWN. In this release you will find a pre-compiled binary named bsdAUTOPWN compiled on FreeBSD-9.0-CURRENT-2010 (i386). Tested on FreeBSD 8.0. Release alongwith FreeBSD-9.0-CURRENT.

This is the first release of BSDAUTOPWN and does not have all the exploits which are currently available for winAUTOPWN.

BSDAUTOPWN is still under development and hopefully will be enriched with all the exploits which are already present and also which will be added to winAUTOWPN in the future.